The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Here's what we observed, what we talked about, and what resonated.
To avoid overspending, businesses should reevaluate their security vendors and prioritize a more cost-effective approach.
In this guide, we’ll explain why connection data matters. Next, we'll cover how the PROXY protocol works, how to use the TShark analyzer to capture and inspect packets and view the extraction results.
CVE-2023-44487 found in the HTTP/2 protocol could allow a DoS attack against web servers, reverse proxies, or other software. HAProxy products are unaffected, but we're monitoring the situation.
The G2 Fall 2023 Reports are in! HAProxy's acclaim across multiple categories, market levels, and global segments has risen. Here's what users are saying about their HAProxy use cases.
Users who upgrade to the latest versions will benefit from features that enhance the flexibility of our enterprise security options to meet even more use cases.
HAProxy Technologies released new versions of its products to fix the vulnerability CVE-2023-40225. Learn more here.
In this blog post, we show how to collect HTTP header logs and store them remotely to avoid overwhelming your standard log system.
Showing 1 of 20 Pages